Results 11 to 20 of about 3,206,915 (290)

Dubhe: a deep-learning-based B5G coverage analysis method

open access: yesEURASIP Journal on Advances in Signal Processing, 2021
In recent years, with the rapid development of various technologies such as the Internet of Things and the Internet, the demand for massive device connections and a variety of differentiated new business applications has continued to increase.
Haoyan Xu, Xiaolong Xu, Fu Xiao
doaj   +1 more source

Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [PDF]

open access: yesComputer and Knowledge Engineering, 2023
Today’s cyber-attacks are getting more sophisticated and their volume is consistently growing. Organizations suffer from various attacks in their lifetime each of which exploiting different vulnerabilities, therefore, preventing them all is not ...
Masoud Khosravi-Farmad   +1 more
doaj   +1 more source

REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]

open access: yes, 2020
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall   +2 more
core   +2 more sources

Secure sharing of geospatial wildlife data [PDF]

open access: yesProceedings of the Fourth International ACM Workshop on Managing and Mining Enriched Geo-Spatial Data, 2017
ISBN:978-1-4503-5047 ...
Frey, Remo M.   +4 more
openaire   +2 more sources

On the inability of existing security models to cope with data mobility in dynamic organizations [PDF]

open access: yes, 2008
Modeling tools play an important role in identifying threats in traditional\ud IT systems, where the physical infrastructure and roles are assumed\ud to be static.
Dimkov, Trajce   +2 more
core   +16 more sources

Estimating the Growing Stem Volume of the Planted Forest Using the General Linear Model and Time Series Quad-Polarimetric SAR Images

open access: yesSensors, 2020
Increasing the area of planted forests is rather important for compensation the loss of natural forests and slowing down the global warming. Forest growing stem volume (GSV) is a key indicator for monitoring and evaluating the quality of planted forest ...
Jiangping Long   +4 more
doaj   +1 more source

Research of Big data and data security [PDF]

open access: yesProceedings of the 2015 International Conference on Materials Engineering and Information Technology Applications, 2015
With the rise of blogs, social networks, and the vigorous development of cloud computing and Internet technology, the data is increasing at an unprecedented speed and cumulative, the big data era has come. The basic concept of big data, key techniques and the use of there are a lot of doubt and controversy.
Zhongyuan Xu, Qiong Ren
openaire   +1 more source

Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]

open access: yes, 2010
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M.   +2 more
core   +3 more sources

A Dynamic Bidding Strategy Based on Model-Free Reinforcement Learning in Display Advertising

open access: yesIEEE Access, 2020
Real-time bidding (RTB) is one of the most striking advances in online advertising, where the websites can sell each ad impression through a public auction, and the advertisers can participate in bidding the impression based on its estimated value.
Mengjuan Liu   +4 more
doaj   +1 more source

On Burst Error Correction and Storage Security of Noisy Data [PDF]

open access: yes, 2011
Secure storage of noisy data for authentication purposes usually involves the use of error correcting codes. We propose a new model scenario involving burst errors and present for that several constructions.Comment: to be presented at MTNS ...
Fontein, Felix   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy